Загрузка страницы

Applying Deep Graph Representation Learning to the Malware Graph

CAMLIS 2019, Bayan Bruss
Applying Deep Graph Representation Learning to the Malware Graph (abstract: https://www.camlis.org/2019/talks/bruss)

Видео Applying Deep Graph Representation Learning to the Malware Graph канала CAMLIS
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
13 ноября 2019 г. 3:51:19
00:32:19
Другие видео канала
SQL Driven Infrastructure for Cybersecurity ML OperationsSQL Driven Infrastructure for Cybersecurity ML OperationsUsing Anomaly Detection on User Demographic Distributions to Identify Fake Account BurstsUsing Anomaly Detection on User Demographic Distributions to Identify Fake Account BurstsThreat Detection on Kubernetes Logs Using GNN EmbeddingsThreat Detection on Kubernetes Logs Using GNN EmbeddingsMalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and PackersMalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and PackersMinimizing Compute Costs: When When Should We Run More Expensive Malware Analysis? (CAMLIS 2022)Minimizing Compute Costs: When When Should We Run More Expensive Malware Analysis? (CAMLIS 2022)An Effective Framework for Malware Detection and Classification using Feature PrioritizationAn Effective Framework for Malware Detection and Classification using Feature PrioritizationFASER: Binary Code Similarity Search through the use of Intermediate RepresentationsFASER: Binary Code Similarity Search through the use of Intermediate RepresentationsActivation Analysis of a Byte-based Deep Neural Network for Malware ClassificationActivation Analysis of a Byte-based Deep Neural Network for Malware ClassificationLLM Prompt Injection: Attacks and DefensesLLM Prompt Injection: Attacks and DefensesExploring Backdoor Poisoning Attacks Against Malware ClassifiersExploring Backdoor Poisoning Attacks Against Malware ClassifiersCompilation as a Defense: Enhancing DL Model Attack Robustness via Tensor OptimizationCompilation as a Defense: Enhancing DL Model Attack Robustness via Tensor OptimizationA feature presentation: semi-supervised learning of file representationsA feature presentation: semi-supervised learning of file representationsPlaying Cat and Mouse with the Attacker: Frequent Item Set Mining in the Registry (CAMLIS 2022)Playing Cat and Mouse with the Attacker: Frequent Item Set Mining in the Registry (CAMLIS 2022)Keynote: Lessons Learned in Red Teaming AI Systems in High-Stakes Environments (CAMLIS 2022)Keynote: Lessons Learned in Red Teaming AI Systems in High-Stakes Environments (CAMLIS 2022)Next Generation Process Emulation with BineeNext Generation Process Emulation with BineeDescribing Malware via TaggingDescribing Malware via TaggingEMBER ImprovementsEMBER ImprovementsProblemChild: Discovering Anomalous Patterns based on Parent-Child Process RelationshipsProblemChild: Discovering Anomalous Patterns based on Parent-Child Process RelationshipsPlaying Defense: Benchmarking Cybersecurity Capabilities of Large Language ModelsPlaying Defense: Benchmarking Cybersecurity Capabilities of Large Language ModelsInroads in Autonomous Network Defence using Explained Reinforcement Learning (CAMLIS 2022)Inroads in Autonomous Network Defence using Explained Reinforcement Learning (CAMLIS 2022)Keynote - Lessons for AI Security PreparednessKeynote - Lessons for AI Security Preparedness
Яндекс.Метрика